In this one-day session, candidates will be exposed to various case-studies which put forward the impact of implementation of lax security practices and controls over the information assets; and the damage it can cause to the organization. We look into emerging threat platforms which act as the new avenues for attackers to gather organization’s sensitive data.
We also look into how to construct perimeter defenses and configuration hardening to provide baseline security for the organization. We also explore the necessity of having a good security governance structure comprising of good security practices for warding off potential threats to have any impact on the organization. Lastly, we look into the need for proper incident management practices whenever a breach happens and is detected in the organization.
This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.